Number Theory and Cryptogrpahy
Number Theory and Cryptogrpahy
CRYPTOGRAPHY
Freya A Shah
“MATHEMATICS IS THE QUEEN
OF THE SCIENCES-AND NUMBER
THEORY IS THE QUEEN OF
MATHEMATICS”
. Miller-Rabin Primality Test is more accurate test than the Fermat’s Primality Test. It is faster and
easy to implement and taking into use for cryptography and its applications.
. Asymptotic security
. Quantum computing and alternate approaches in breaking current encryption methods and
something beyond prime number to come.
POLLARD’S RHO ALGORITHM
. Mathematical functions are used to define the steps taken at a time on a Modular Track which is based on the
numbers being factored .
. Two selected starting points, the Tortoise and the Hare. Their positions are consistently updated based using
the predefined function [mod n], it refers to the remainder after performing division by that number (n).
. This algorithm relies on the “Birthday Paradox”- even with a large track, there stays a high probability that
both contestants will land on the same spot (the difference is the product of the number being factored).
. It does not work equally efficient with large prime numbers as it does with small prime numbers.
. The Track Size which is determined by the composite number grows exponentially with the increasing count
of digits making it complex for the ‘contestants’ to collide efficiently.
QUADRATIC SIEVE
. Generates pairs of integers with specific properties related to the number being factored.
. The pairs are then SIFTED to find ones where the difference is a perfect square.
. By combining these SMOOTH squares, the algorithm can find a factor of the original number.
. Sifting is computationally expensive and its efficiency highly relies on finding smooth squares.
. For tackling truly gigantic primes, more advanced algorithms like the General Number Field Sieve
(GNFS) are employed, but these require significantly more computational resources.
.
DEMYSTIFYING
CRYPTOGRPAHY:
WHAT ITS NOT
“ Cryptography, a digital shield”
MISCONCEPTION 1 : JUST ABOUT CODES AND
CIPHERS
. SECURE PROTOCOLS
. CRYPTOGRAPHIC ALGORITHMS
. Core principles are about encryption, decryption and and digital signatures.
>> VPNs (Virtual Private Networks) >> Secure Storage of Sensitive Information
MISCONCEPTION 3:UNBREAKABLE ENCRYPTION
CODEMAKERS v.s. CODEBREAKERS
>> Finance
Encryption - Safeguards online banking transactions
Data Integrity - ensures funds haven’t been tampered with during transfer
>>
Healthcare
Encryption - Protects Patient’s Medical Record
>> Communication
Encryption - Scrambles messages before sending